PeopleTec, Inc.-posted 5 months ago
Full-time • Entry Level
Huntsville, AL
501-1,000 employees

PeopleTec is currently seeking a SOC Operations Analyst to support our Huntsville, AL location. The SOC Operations Analyst is responsible for monitoring computer networks for security issues, investigating security breaches and other cybersecurity incidents, and documenting security breaches while assessing the damage they cause. The analyst will work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing, and will fix detected vulnerabilities to maintain a high-security standard. Additionally, the analyst will recommend best practices for IT security, install security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. The role requires conducting analysis, confirming intrusion information, and creating a forensically sound duplicate of the files. The analyst will decrypt data, provide technical summaries and input, examine recovered data for relevant information, and perform dynamic analysis including timeline, statistical, and file signature analysis. The position also involves performing real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).

  • Monitor computer networks for security issues.
  • Investigate security breaches and other cybersecurity incidents.
  • Document security breaches and assess the damage they cause.
  • Work with the security team to perform tests and uncover network vulnerabilities.
  • Fix detected vulnerabilities to maintain a high-security standard.
  • Recommend best practices for IT security.
  • Install security measures and operating software to protect systems and information infrastructure.
  • Conduct analysis and confirm intrusion information.
  • Create a forensically sound duplicate of the files.
  • Decrypt data and provide technical summaries and input.
  • Examine recovered data for relevant information.
  • Perform dynamic analysis including timeline, statistical, and file signature analysis.
  • Perform real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
  • Junior: 1 year of experience.
  • Mid: 5 years of experience.
  • Senior: 8 years of experience.
  • Experience with Splunk Enterprise Security.
  • Must be willing to work a shift schedule.
  • Must be a U.S. Citizen.
  • An active DoD Top Secret clearance with SCI eligibility is required.
  • Experience with Microsoft Sentinel.
  • GIAC Continuous Monitoring Certification (GMON).
  • GIAC Certified Incident Handler (GCIH).
  • GIAC Certified Forensic Analyst (GCFA).
  • GIAC Certified Intrusion Analyst (GCIA).
  • GIAC Network Forensic Analyst (GNFA).
  • Continuing-education opportunities.
  • Robust training programs.
  • People First benefits package.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service